Patent application number | Description | Published |
20080225866 | Reducing network traffic to teredo server - Methods and systems for reducing network load on a Teredo server. | 09-18-2008 |
20080225867 | Faster NAT detection for Teredo client - Methods and systems for allowing a Teredo client behind a network address translation device to detect more rapidly the type of network address translation device. | 09-18-2008 |
20080225868 | Allowing IPv4 clients to communicate using Teredo addresses when both clients are behind a NAT - Methods and systems for allowing clients behind a network address translation device to communicate when those clients are assigned Teredo IPv6 addresses. | 09-18-2008 |
20080240132 | Teredo connectivity between clients behind symmetric NATs - Methods and systems for communicating between Teredo clients behind symmetric or restricted Network Address Translators. | 10-02-2008 |
20090006595 | Edge traversal service dormancy - A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons. | 01-01-2009 |
20100088418 | EDGE TRAVERSAL SERVICE DORMANCY - A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons. | 04-08-2010 |
20110302314 | EDGE TRAVERSAL SERVICE DORMANCY - A system maintains a dormant state in the host, in which no beacons (or “bubbles”) are transmitted from the host when no application or service (collectively, “processes”) of the host is accepting unsolicited traffic via the edge traversal service. When at least one application or service begins to accept unsolicited traffic via the edge traversal service, the host enters a qualified state and begins transmitting the beacons. As each additional application or service begins to accept such traffic, the number of accepting applications and services is maintained. As applications and services terminate acceptance of such traffic, the number of accepting applications and services is decremented. When the last application or service terminates acceptance of unsolicited traffic via the edge traversal service, the host re-enters the dormant state and ceases transmission of its beacons. | 12-08-2011 |
20120195305 | AGGREGATING ENDPOINT CAPABILITIES FOR A USER - A method and system for aggregating capabilities from multiple endpoints associated with a user are provided. The system aggregates the capabilities of the endpoints associated with a user into an aggregate view of available modes of communication for reaching the user. Then, the system publishes the aggregate view so that other users who want to send communications to the user will know the modes of communication available for that user. In addition, the system may designate certain modes of communication as preferred or as capable of reaching the user. | 08-02-2012 |
20130198383 | Network Access Based on Social-Networking Information - In one embodiment, a method includes receiving a request at a wireless access point from a client system to access a network through the wireless access point. The wireless access point sends an identifier associated with the client system to a social-networking system, the social-networking system including user profiles arranged in one or more social graphs. The social graphs store relationships between the user profiles. The method further includes receiving at the wireless access point from the social-networking system an authorization determination. The authorization determination is based upon a first user profile of the plurality of user profiles. The first user profile includes the identifier associated with the client system. The method further includes providing the client system with access to the network through the wireless access point in accordance with the authorization determination. | 08-01-2013 |
20140068038 | Maintain Persistent Connections Between Servers and Mobile Clients - In one embodiment, a method includes iteratively waiting for a time interval; sending a keep-alive message from a first computing device to a second computing device; and incrementing a current value of the time interval when the first computing device receives from the second computing device a response to a current keep-alive message sent during the current iteration, until the first computing device does not receive from the second computing device any responses to the current keep-alive message sent during the current iteration; and setting the current value of the time interval to a previous value of the time interval from an immediately-previous iteration. | 03-06-2014 |
20140114738 | Automatic Check-In Using Social-Networking Information - In one embodiment, a method includes detecting by a computer system of an entity a client system identifier. The detection is accomplished using a first wireless communication method. The method further includes sending by the computer system the client system identifier to a social-networking system. The social-networking system includes multiple user profiles arranged in at least one social graph that stores relationships between the user profiles. The method also includes receiving at the computer system from the social-networking system user profile information from a user profile of the user profiles, the user profile identified by the social-networking system as being associated with the client system identifier. The method further includes sending information associated with the entity to the client system in response to receiving the user profile information. | 04-24-2014 |
20140172973 | Mobile Push Notification - In one embodiment, a method includes sending to a mobile client computing device a first notification through a real-time push service, the first notification including content and being associated with a stateful object; the method also includes, in response to a state change of the stateful object, sending to the mobile client computing device a second notification through the real-time push service, the second notification including an update to the content based on the state change of the stateful object. | 06-19-2014 |